Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
30-06-2020 12:21
Static task
static1
Behavioral task
behavioral1
Sample
Doc#243567298.exe
Resource
win7
Behavioral task
behavioral2
Sample
Doc#243567298.exe
Resource
win10v200430
General
-
Target
Doc#243567298.exe
-
Size
574KB
-
MD5
2181ddc7631f71f3d6809ba15f89bf49
-
SHA1
cd660cf95580790d1021d69d3e11423586938c32
-
SHA256
bce54c823dd88b4bcb06eac2581ba7c290476786d6c76daf0f765066742e0c6f
-
SHA512
382213d0b5d584c5db7a941c0b4b9cc1e6e9fffc017d6c8feaff33f6e3d0114d490c33cbca3d5a6193a2b70ee30c5a7c7f5e6e7556cb89cf69fb2c18338b0cfd
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
dogdollars@jakartta.xyz - Password:
winnerq123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1256-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1256-3-0x0000000000446A1E-mapping.dmp family_agenttesla behavioral1/memory/1256-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1256-5-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Doc#243567298.exedescription pid process target process PID 1516 set thread context of 1256 1516 Doc#243567298.exe Doc#243567298.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Doc#243567298.exepid process 1256 Doc#243567298.exe 1256 Doc#243567298.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Doc#243567298.exedescription pid process Token: SeDebugPrivilege 1256 Doc#243567298.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Doc#243567298.exepid process 1256 Doc#243567298.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Doc#243567298.exedescription pid process target process PID 1516 wrote to memory of 2008 1516 Doc#243567298.exe schtasks.exe PID 1516 wrote to memory of 2008 1516 Doc#243567298.exe schtasks.exe PID 1516 wrote to memory of 2008 1516 Doc#243567298.exe schtasks.exe PID 1516 wrote to memory of 2008 1516 Doc#243567298.exe schtasks.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe PID 1516 wrote to memory of 1256 1516 Doc#243567298.exe Doc#243567298.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doc#243567298.exe"C:\Users\Admin\AppData\Local\Temp\Doc#243567298.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EaRAbigWAwa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF3C0.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Doc#243567298.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpF3C0.tmpMD5
93a258c1a76dc6c7e6164667940b1b13
SHA16b5f0765d71820a507187b8efb9bc9b71951a01e
SHA2566576eb3bb04384b80d4f9c22f313e39cf4b91599470b18fd589194b9d06bfd82
SHA512e81970b91c62ad3417ef97efdb613f45f822197cd21404b08246507c297c050c73bc1bc4b85cc21bc6c7dd6b51a5ee69c83014aab9e3600018e9953e6c1a3caa
-
memory/1256-2-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1256-3-0x0000000000446A1E-mapping.dmp
-
memory/1256-4-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1256-5-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2008-0-0x0000000000000000-mapping.dmp